- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Fungal Biology and Applications
- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Parallel Computing and Optimization Techniques
- Nutritional Studies and Diet
- Advanced Mathematical Modeling in Engineering
- Interconnection Networks and Systems
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Diet and metabolism studies
- Phytochemistry and Bioactivity Studies
- Navier-Stokes equation solutions
- Embedded Systems Design Techniques
- Phytochemicals and Antioxidant Activities
- Video Surveillance and Tracking Methods
- Advanced Steganography and Watermarking Techniques
- Mathematical and Theoretical Epidemiology and Ecology Models
- Cancer, Lipids, and Metabolism
- Cryptography and Data Security
- COVID-19 and Mental Health
- Mathematical Biology Tumor Growth
- Cryptography and Residue Arithmetic
- Embedded Systems and FPGA Design
Shanghai Jiao Tong University
2007-2025
Shandong University of Science and Technology
2012-2025
Hangzhou Academy of Agricultural Sciences
2015-2025
UNSW Sydney
2023-2024
Xi’an University of Posts and Telecommunications
2021
Beihang University
2014-2019
Harvard University
2016-2018
IBM (United States)
2015
GlobalFoundries (Cayman Islands)
2015
Wenzhou University
2015
The glycaemic and insulin indices assess postprandial response to foods, respectively, which may not reflect the long-term effects of diet on response. We developed evaluated validity four empirical insulinaemic potential usual diets lifestyles, using dietary, lifestyle biomarker data from Nurses' Health Study (NHS, n 5812 for hyperinsulinaemia, 3929 resistance). were as follows: dietary index hyperinsulinaemia (EDIH) (ELIH); resistance (EDIR) (ELIR). entered thirty-nine FFQ-derived food...
We examined the role of insulinemic potential diet and lifestyle in development cancers digestive system, using two plasma C-peptide-based indices: empirical dietary index for hyperinsulinemia (EDIH) (ELIH).
At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks. This paper presents an architectural-enhanced security design to detect One part is instructions monitoring verification used trace execution behavior programs. Another one secure tag validation monitor attributes every memory segment. The automated extraction tools extract model each segment at compile time. run-time, designed observes its dynamic checks whether conforms...
Background The objective of the present study is to examine total phenolic and flavonoid content an ethanol extract Sanghuangporus sanghuang evaluate its phytochemical properties, antioxidant activity, capacity protect DNA from damage. This pharmaceutical/food resource mushroom may serve as a novel substitute functional food for health-conscious consumers, given promising source phenolics flavonoids. Methods S. (SEE) was evaluated contents, while UPLC-MS analysis used terpenoids,...
Free amino acid, flavor 5’-nucleotides, organic and the values of equivalent umami concentration cultivable mushrooms, namely Pleurotus eryngii, Agrocybe aegerita, Lentinus edodes, were investigated at different cultivation stages, mycelia, primordium, fruit bodies. Fruit bodies higher than mycelia in contents total free three cultivated but lower acid P. eryngii L. respectively. Contents stages mushrooms ranged from 32.65 to 125.50 mg g–1 with primordium stage edodes being highest. Overall,...
At present, the embedded systems are facing various kinds of attacks, especially for data stored in external memories. This paper presents a hardware-enhanced protection method to protect integrity and confidentiality at runtime, preventing from spoofing attack, splicing replay some malicious analysis. For protection, signature is calculated by hardware implemented Lhash engine before sending off chip, block recalculated compared with decrypted one load time. an AES encryption used generate...
Camellia shells are the main by-product of camellia seed processing and usually incinerated or disposed as agricultural waste. In this study, were employed in
In order to reduce the decoding latency, a new early stopping criterion is proposed for belief propagation (BP) decoding. A kind of special processing elements (PEs) BP decoder called frozen and information PE (FIPE) selected predict whether successful or not. Statistics indicate that FIPE can be considered reliable when bit decoded successfully. The based on fact number increase along with iterations variation trend approximate ratio correct bits. term hardware complexity, method has linear...
Sanghuangporus, a medicinal mushroom, has gained significant attention due to its beneficial properties. Phenolic acids are among the major bioactive compounds in known for their antioxidant and anti-inflammatory activities. To precisely quantify phenolic acid content, we developed method utilizing ultra-high-performance liquid chromatography with triple quadrupole (UHPLC-QqQ). This study optimized UHPLC-QqQ conditions simultaneously separate detect eight Sanghuangporus baumii (Pilát) L.W....
The COVID-19 pandemic brought with it significant social, economic and health uncertainties. These were proposed to impact young people more compared adults, leading adolescents report mental problems during the pandemic. current study examined whether differences in cognitive risk (tolerance of uncertainty) protective (psychological flexibility) factors accounted for age-related depression anxiety.
Abstract Pleurotus pulmonarius is a medium temperature edible mushroom, and its yield quality are severely affected by high temperature. However, the molecular mechanism of response to heat stress remains unknown. In this study, transcriptome sequencing analysis mycelia under were performed, related differentially expressed genes (DEGs) verified fluorescence quantitative PCR (qPCR) reduced glutathione content was detected. 5906 DEGs, including 1086 upregulated 4820 downregulated, identified...
A rapid, precise, and dependable method for quantifying flavonoids in the fruiting bodies of Sanghuangporus was established using ultra-high-performance liquid chromatography coupled with triple quadrupole mass spectrometry (UHPLC-QQQ-MS/MS). Separation achieved a ZORBAX Eclipse Plus C18 column (1.8 μm, 3.0 mm × 100 mm) 15 min gradient mobile phase consisting 0.01% aqueous formic acid 2 mm/L ammonium formate (mobile A), methanol B). analysis performed multiple reaction monitoring (MRM) mode...
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and hardware-assisted security techniques struggle detect or block these attacks with minor performance implementation overhead. To address this issue, paper presents a lightweight scheme enhance the against We develop an on-chip hardware shadow stack validate target addresses at runtime for backward-edge control flow...
Summary Traditional tracking classification algorithm has been widely applied to target in wireless sensor networks. In this paper, focusing on the accuracy of networks, we propose an improved threshold factor track algorithm. The extracts motion model according intrinsic properties target. It updates iterative center real‐time state moving and timely filters out weak correlated or uncorrelated data. order show is more effective, compare proposed with based Euclidean distance comprehensive...
Embedded systems are vulnerable to various kinds of attacks when they in execution. Advanced attacks, such as buffer overflow, able inject malicious code at runtime. Besides, physical also becoming more common. This paper presents a new hardware-assisted architecture validate the execution program which is reliable, effective and low overhead. A specified tool developed collect software properties each basic block from binary automatically. At runtime, proposed scheme checks whether...
The Control Flow Graph represents all possible paths a program may take during execution. Integrity is critical concern in embedded system security, and the CFG can be integrated with hardware circuit design to validate CFI. In this paper, we present static extraction scheme for RISC-V based on executable files. During construction of CFGs, information such as instructions each basic blocks, block length, transfer targets extracted. Additionally, data hash values blocks calculated. Those...